Copiale cipher

Last updated
Copiale cipher
private collection
Copiale-cipher09s.png
Pages 16–17
Type codex
Date1730s
Place of origin Wolfenbüttel
Language(s)German, encrypted in abstract symbols, Greek and Roman letters
Author(s)Oculist secret society
Size105 pages
ContentsOculist initiation ceremony
OtherDeciphered in 2011

The Copiale cipher is an encrypted manuscript consisting of 75,000 handwritten characters filling 105 pages in a bound volume. [1] Undeciphered for more than 260 years, the document was decrypted in 2011 with computer assistance. An international team consisting of Kevin Knight of the University of Southern California Information Sciences Institute and Viterbi School of Engineering, along with Beáta Megyesi and Christiane Schaefer of Uppsala University in Sweden, found the cipher to be an encrypted German text. The manuscript is a homophonic cipher that uses a complex substitution code, including symbols and letters, for its text and spaces. [2]

Contents

Previously examined by scientists at the German Academy of Sciences at Berlin in the 1970s, the cipher was thought to date from between 1760 and 1780. [3] Decipherment revealed that the document had been created in the 1730s by a secret society [1] [2] [4] called the "high enlightened (Hocherleuchtete) oculist order" [5] of Wolfenbüttel, [6] or Oculists. [5] [7] [8] The Oculists used sight as a metaphor for knowledge. [9]

The manuscript is in a private collection. [1] A parallel manuscript is kept at the Staatsarchiv Wolfenbüttel. [5]

The Copiale cipher includes abstract symbols, as well as letters from Greek and most of the Roman alphabet. The only plain text in the book is "Copiales 3" at the end and "Philipp 1866" on the flyleaf. Philipp is thought to have been an owner of the manuscript. [5] The plain-text letters of the message were found to be encoded by accented Roman letters, Greek letters and symbols, with unaccented Roman letters serving only to represent spaces.

The researchers found that the initial 16 pages describe an Oculist initiation ceremony. The manuscript portrays, among other things, an initiation ritual in which the candidate is asked to read a blank piece of paper and, on confessing inability to do so, is given eyeglasses and asked to try again, and then again after washing the eyes with a cloth, followed by an "operation" in which a single eyebrow hair is plucked. [10]

Substitution cipher

The Copiale cipher is a substitution cipher. It is not a 1-for-1 substitution but rather a homophonic cipher: each ciphertext character stands for a particular plaintext character, but several ciphertext characters may encode the same plaintext character. For example, all the unaccented Roman characters encode a space. Seven ciphertext characters encode the single letter "e". In addition, some ciphertext characters stand for several characters or even a word. One ciphertext character ("†") encodes "sch", and another encodes the secret society's name. [5] [10]

Decryption method

One naturally wonders if the problem of translation could conceivably be treated as a problem in cryptography. When I look at an article in Russian, I say: 'This is really written in English, but it has been coded in some strange symbols. I will now proceed to decode.

Warren Weaver, Letter to Norbert Wiener, March 4, 1947

A machine translation expert, Knight approached language translation as if all languages were ciphers, effectively treating foreign words as symbols for English words. His approach, which tasked an expectation-maximization algorithm with generating every possible match of foreign and English words, enabled the algorithm to figure out a few words with each pass. A comparison with 80 languages confirmed that the original language was likely German, which the researchers had guessed based on the word "Philipp," a German spelling. Knight then used a combination of intuition and computing techniques to decipher most of the code in a few weeks. Megyesi later realized that a particular symbol meant "eye", and Schaefer connected that discovery to the Oculists.

The Oculists

The Oculists were a group of ophthalmologists led by Count Friedrich August von Veltheim, who died in April 1775. The Philipp 1866 Copiales 3 document, however, appears to suggest that the Oculists, or at least Count Veltheim, were a group of Freemasons who created the Oculist society in order to pass along the Masonic rites [7] [11] which had recently been banned by Pope Clement XII.

See also

Related Research Articles

<span class="mw-page-title-main">Cipher</span> Algorithm for encrypting and decrypting information

In cryptography, a cipher is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is encipherment. To encipher or encode is to convert information into cipher or code. In common parlance, "cipher" is synonymous with "code", as they are both a set of steps that encrypt a message; however, the concepts are distinct in cryptography, especially classical cryptography.

<span class="mw-page-title-main">One-time pad</span> Encryption technique

In cryptography, the one-time pad (OTP) is an encryption technique that cannot be cracked, but requires the use of a single-use pre-shared key that is larger than or equal to the size of the message being sent. In this technique, a plaintext is paired with a random secret key. Then, each bit or character of the plaintext is encrypted by combining it with the corresponding bit or character from the pad using modular addition.

In cryptography, a substitution cipher is a method of encrypting in which units of plaintext are replaced with the ciphertext, in a defined manner, with the help of a key; the "units" may be single letters, pairs of letters, triplets of letters, mixtures of the above, and so forth. The receiver deciphers the text by performing the inverse substitution process to extract the original message.

<span class="mw-page-title-main">Transposition cipher</span> Method of encryption

In cryptography, a transposition cipher is a method of encryption which scrambles the positions of characters (transposition) without changing the characters themselves. Transposition ciphers reorder units of plaintext according to a regular system to produce a ciphertext which is a permutation of the plaintext. They differ from substitution ciphers, which do not change the position of units of plaintext but instead change the units themselves. Despite the difference between transposition and substitution operations, they are often combined, as in historical ciphers like the ADFGVX cipher or complex high-quality encryption methods like the modern Advanced Encryption Standard (AES).

<span class="mw-page-title-main">Vigenère cipher</span> Simple type of polyalphabetic encryption system

The Vigenère cipher is a method of encrypting alphabetic text where each letter of the plaintext is encoded with a different Caesar cipher, whose increment is determined by the corresponding letter of another text, the key.

<span class="mw-page-title-main">Autokey cipher</span> Classic polyalphabet encryption system

An autokey cipher is a cipher that incorporates the message into the key. The key is generated from the message in some automated fashion, sometimes by selecting certain letters from the text or, more commonly, by adding a short primer key to the front of the message.

<span class="mw-page-title-main">Frequency analysis</span> Study of the frequency of letters or groups of letters in a ciphertext

In cryptanalysis, frequency analysis is the study of the frequency of letters or groups of letters in a ciphertext. The method is used as an aid to breaking classical ciphers.

<span class="mw-page-title-main">Ciphertext</span> Encrypted information

In cryptography, ciphertext or cyphertext is the result of encryption performed on plaintext using an algorithm, called a cipher. Ciphertext is also known as encrypted or encoded information because it contains a form of the original plaintext that is unreadable by a human or computer without the proper cipher to decrypt it. This process prevents the loss of sensitive information via hacking. Decryption, the inverse of encryption, is the process of turning ciphertext into readable plaintext. Ciphertext is not to be confused with codetext because the latter is a result of a code, not a cipher.

<span class="mw-page-title-main">Lorenz cipher</span> Cipher machines used by the German Army during World War II

The Lorenz SZ40, SZ42a and SZ42b were German rotor stream cipher machines used by the German Army during World War II. They were developed by C. Lorenz AG in Berlin. The model name SZ was derived from Schlüssel-Zusatz, meaning cipher attachment. The instruments implemented a Vernam stream cipher.

<span class="mw-page-title-main">VIC cipher</span> Complex Soviet pencil and paper cipher

The VIC cipher was a pencil and paper cipher used by the Soviet spy Reino Häyhänen, codenamed "VICTOR".

A straddling checkerboard is a device for converting an alphanumeric plaintext into digits whilst simultaneously achieving fractionation and data compression relative to other schemes using digits. It also is known as a monôme-binôme cipher.

<i>Kryptos</i> Encrypted sculpture by American artist Jim Sanborn

Kryptos is a sculpture by the American artist Jim Sanborn located on the grounds of the Central Intelligence Agency (CIA) headquarters, the George Bush Center for Intelligence in Langley, Virginia. Since its dedication on November 3, 1990, there has been much speculation about the meaning of the four encrypted messages it bears. Of these four messages, the first three have been solved, while the fourth message remains one of the most famous unsolved codes in the world. The sculpture continues to be of interest to cryptanalysts, both amateur and professional, who are attempting to decipher the fourth passage. The artist has so far given four clues to this passage.

The known-plaintext attack (KPA) is an attack model for cryptanalysis where the attacker has access to both the plaintext and its encrypted version (ciphertext). These can be used to reveal further secret information such as secret keys and code books. The term "crib" originated at Bletchley Park, the British World War II decryption operation, where it was defined as:

A plain language passage of any length, usually obtained by solving one or more cipher or code messages, and occurring or believed likely to occur in a different cipher or code message, which it may provide a means of solving.

In cryptography, the ADFGVX cipher was a manually applied field cipher used by the Imperial German Army during World War I. It was used to transmit messages secretly using wireless telegraphy. ADFGVX was in fact an extension of an earlier cipher called ADFGX which was first used on 1 March 1918 on the German Western Front. ADFGVX was applied from 1 June 1918 on both the Western Front and Eastern Front.

Gilbert Sandford Vernam was a Worcester Polytechnic Institute 1914 graduate and AT&T Bell Labs engineer who, in 1917, invented an additive polyalphabetic stream cipher and later co-invented an automated one-time pad cipher. Vernam proposed a teleprinter cipher in which a previously prepared key, kept on paper tape, is combined character by character with the plaintext message to produce the ciphertext. To decipher the ciphertext, the same key would be again combined character by character, producing the plaintext. Vernam later worked for the Postal Telegraph Company, and became an employee of Western Union when that company acquired Postal in 1943. His later work was largely with automatic switching systems for telegraph networks.

In cryptography, a classical cipher is a type of cipher that was used historically but for the most part, has fallen into disuse. In contrast to modern cryptographic algorithms, most classical ciphers can be practically computed and solved by hand. However, they are also usually very simple to break with modern technology. The term includes the simple systems used since Greek and Roman times, the elaborate Renaissance ciphers, World War II cryptography such as the Enigma machine and beyond.

<span class="mw-page-title-main">M-209</span> Mechanical cipher machine

In cryptography, the M-209, designated CSP-1500 by the United States Navy is a portable, mechanical cipher machine used by the US military primarily in World War II, though it remained in active use through the Korean War. The M-209 was designed by Swedish cryptographer Boris Hagelin in response to a request for such a portable cipher machine, and was an improvement of an earlier machine, the C-36.

<span class="mw-page-title-main">Pigpen cipher</span> Type of substitution cipher

The pigpen cipher is a geometric simple substitution cipher, which exchanges letters for symbols which are fragments of a grid. The example key shows one way the letters can be assigned to the grid.

<span class="mw-page-title-main">BATCO</span> British paper cryptographic system

BATCO, short for Battle Code, is a hand-held, paper-based encryption system used at a low, front line level in the British Army. It was introduced along with the Clansman combat net radio in the early 1980s and was largely obsolete by 2010 due to the wide deployment of the secure Bowman radios. BATCO consists of a code, contained on a set of vocabulary cards, and cipher sheets for superencryption of the numeric code words. The cipher sheets, which are typically changed daily, also include an authentication table and a radio call sign protection system.

Turingery or Turing's method was a manual codebreaking method devised in July 1942 by the mathematician and cryptanalyst Alan Turing at the British Government Code and Cypher School at Bletchley Park during World War II. It was for use in cryptanalysis of the Lorenz cipher produced by the SZ40 and SZ42 teleprinter rotor stream cipher machines, one of the Germans' Geheimschreiber machines. The British codenamed non-Morse traffic "Fish", and that from this machine "Tunny".

References

  1. 1 2 3 "Computer Scientist Cracks Mysterious 'Copiale Cipher'". American Association for the Advancement of Science. October 25, 2011.
  2. 1 2 New York Times: John Markoff, "How revolutionary tools cracked a 1700s code," October 24, 2011, retrieved October 25, 2011
  3. "Rätsel nach 250 Jahren gelöst: Forscher entschlüsseln mysteriöse Geheimschrift". bild.de. 27 October 2011. Retrieved May 13, 2020.
  4. Archived 2011-11-12 at the Wayback Machine (the complete proceedings) or (the relevant presentation): Knight, Kevin, Megyesi, Beáta and Schaefer, Christiane "The Copiale Cipher," Proceedings of the 4th Workshop on building and using comparable corpora, pages 2–9, 49th Annual Meeting of the Association for Comparable Linguistics, 24 June 2011. Retrieved October 25, 2011
  5. 1 2 3 4 5 Knight, Kevin; Megyesi, Beáta; Schaefer, Christiane (2011). "The Copiale Cipher". Uppsala Universitet, Institutionen för lingvistik och filologi website. Retrieved 2011-10-25. Includes images of the full text, as well as full translations in German and English.
  6. Henning, Aloys "Eine frühe Loge des 18. Jahrhunderts: 'Die Hocherleuchtete Oculisten-Gesellschaft' in Wolfenbüttel", in: Europa in der frühen Neuzeit, Festschrift für Günter Mühlpfordt 5, Aufklärung in Europa, hg. Erich Donnert, Köln/Weimar/Wien 1999, S. 65–82.
  7. 1 2 Shactman, Noah (16 November 2012). "They Cracked This 250-Year-Old Code, and Found a Secret Society Inside". Wired . Vol. 20, no. 12. Retrieved 2 November 2013.
  8. USC Scientist Cracks Mysterious "Copiale Cipher" on YouTube, on the official USC channel.
  9. Shachtman, Noah (Nov 16, 2012). "They Cracked This 250-Year-Old Code, and Found a Secret Society Inside". Wired. Vol. 20, no. 12. Retrieved May 13, 2020 via www.wired.com.
  10. 1 2 Boyle, Alan (October 25, 2011). "Secret society's code cracked". MSNBC. Archived from the original on November 2, 2011. Retrieved October 25, 2011.
  11. James D. Hodgkins (April 2012). "The Copiale Cipher: An Early German Masonic Ritual Unveiled". scottishrite.org. Retrieved 1 July 2018.